Latest Additions to the Library
Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector
This report describes a new insider threat study in which researchers extracted technical and behavioral patterns from fraud cases and developed insights and risk indicators of malicious insider activity within...
CMMI for Acquisition, Version 1.3
This 2010 report details CMMI for Acquisition (CMMI-ACQ) V.1.3, which provides a comprehensive integrated set of guidelines for acquiring products and services.
Documenting Software Architectures: Views and Beyond, Second Edition
This book provides the most complete and current guidance on how to capture a software architecture in a commonly understandable form.
The Illusion of Certainty - Paper
In this 2010 paper, Grady Campbell - delivered at the 7th Acquisition Research Symposium - argues that a new approach to acquisition is needed that recognizes that hiding uncertainty is...
U.S. Army Workshop on Exploring Enterprise, System of Systems, System, and Software Architectures
The workshop summarized in this report confirms that various architectural genres enjoy more commonalities than differences. Nevertheless, each one has its own important knowledge base, and openness among the various...